Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows nt terminal server vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-0391
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an malicious user to replay the response and impersonate a user.
Microsoft Terminal Server
Microsoft Windows Nt 3.5.1
Microsoft Windows Nt 4.0
Microsoft Windows 2000
7.2
CVSSv2
CVE-2000-0259
The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.
Microsoft Terminal Server
Microsoft Windows Nt 4.0
2.1
CVSSv2
CVE-2000-0232
Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an malicious user to cause a denial of service via a malformed TCP/IP print request.
Microsoft Terminal Server
Microsoft Windows 2000
Microsoft Windows Nt 4.0
1 EDB exploit
5
CVSSv2
CVE-2000-0331
Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.
Microsoft Terminal Server
Microsoft Windows 2000
Microsoft Windows Nt 4.0
5
CVSSv2
CVE-2000-0404
The CIFS Computer Browser service allows remote malicious users to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the "ResetBrowser Frame" vulnerability.
Microsoft Terminal Server
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt 4.0
7.5
CVSSv2
CVE-1999-0909
Multihomed Windows systems allow a remote malicious user to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
Microsoft Terminal Server
Microsoft Windows Nt 4.0
Microsoft Windows 98se
Microsoft Windows 95 0a
Microsoft Windows 95 0b
7.8
CVSSv2
CVE-2000-0305
Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote malicious user to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.
Be Beos 5.0
Microsoft Windows 2000
Microsoft Windows 95
Microsoft Windows 98
Microsoft Windows Nt 4.0
Microsoft Terminal Server
1 EDB exploit
5
CVSSv2
CVE-2002-0863
Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote malicious user to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption i...
Microsoft .net Windows Server Beta3
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows Xp
7.5
CVSSv2
CVE-2003-0003
Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.
Microsoft Windows 2000 Terminal Services -
Microsoft Windows 2000 Terminal Services
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows Xp -
2 EDB exploits
7.5
CVSSv2
CVE-2002-0693
Buffer overflow in the HTML Help ActiveX Control (hhctrl.ocx) in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote malicious users to execute code via (1) a long parameter to the Alink f...
Microsoft Windows 2000
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000 Terminal Services
Microsoft Windows 98
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »